In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreThe comparative method plays a major role in Maupassant’s novel (A woman’s Life).This is due to a good theme choice and smooth writing style characterized by simplicity, spontaneity and brevity.
The author uses the comparative method in the introduction of his novel where he compares the monastery’s closed world to the open world of the countryside of La Normandie, which represents the dream life of the heroine Jeanne.
The present paper is an attempt to answer the question regarding the importance of applying the comparative method in the novel (A Woman’s Life) by Maupassant. The paper stresses the fact that the novelist employs the comparative method in his book for certain features .One of these features is the
... Show MoreExperimental programs based test results has been used as a means to find out the response of individual elements of structure. In the present study involves investigated behavior of five reinforced concrete deep beams of dimension (length 1200 x height 300 x width150mm) under two points concentrated load with shear span to depth ratio of (1.52), four of these beams with hallow core and
retrofit with carbon fiber reinforced polymer CFRP (with single or double or sides Strips). Two shapes of hallow are investigated (circle and square section) to evaluated the response of beams in case experimental behavior. Test on simply supported beam was performed in the laboratory & loaddeflection, strain of concrete data and crack pattern of
The investment budget represents a stage of the investment decision in service units, and the preparation and implementation needs to be a complement of the same planning part, because the planning does not end with the development of the plan, but includes a follow-up implementation, so it has to be effective and efficient oversight of the estimates and procedures for disbursement of funds approved for investment projects, The problem with research in that local governments suffer from the presence of Allkaat and problems facing the implementation of the investment budget projects due to the adoption budget items which can not be measured the efficiency of the performance of these units of government by, and shortcomings in the control
... Show MoreMyelosuppression is a serious disease that is related to the malfunction of blood cells production that leads to cytopenia which is the most serious hematologic toxicity of cancer chemotherapies including cyclophosphamide, which is a strong oxazaphosphorine [a nitrogen mustard alkylating agent] that can be used alone or combined with other chemotherapeutic agents for the treatment of different malignant diseases. It induces severe bone marrow suppression by damaging hematopoietic stem cells through the generation of oxidative stress. Fisetin is a hydrophobic polyphenolic compound with a wide range of pharmacological properties such as antioxidant, anti-inflammatory, antimicrobial, osteoprotective, antidiabetic, and anti-carcinogenic
... Show MoreBackground/Aim: Endometrial abnormalities represent a diagnostic challenge due to overlapping imaging features with normal endometrium. Aim of this study was to assess accuracy of dynamic contrast-enhanced and diffusion-weighted magnetic resonance imaging (MRI) in evaluation of endometrial lesions in comparison with T2 and to assess local staging validity and degree of myometrial invasion in malignancy. Methods: Forty patients with abnormal vaginal bleeding or sonographic thickened endometrial were recruited. MRI examination of pelvis was per-formed using 1.5 T scanner with a pelvic array coil. Conventional T1-and T2, dynamic contrast-enhanced (DCE) sequences and diffusion-weighted image (DWI) were performed. Results: Mean age of pa
... Show MoreKE Sharquie, AA Noaimi, E Abdulqader, WK Al-Janabi, J Dermatol Venereol, 2020 - Cited by 6